Sfoglia per Autore NARDONE, Vittoria
Infer Gene Regulatory Networks from Time Series Data with Probabilistic Model Checking
2015-01-01 Ceccarelli, M; Cerulo, L; De Ruvo, G; Nardone, V; Santone, Antonella
Ransomware Steals your Phone. Formal Methods Rescue it
2016-01-01 Mercaldo, F; Nardone, V; Santone, Antonella; Visaggio, C. A.
Download Malware? No, thanks. How Formal Methods can Block Update Attacks
2016-01-01 Mercaldo, F; Nardone, V; Santone, Antonella; Visaggio, Ca
Ransomware Inside Out
2016-01-01 Mercaldo, F; Nardone, V; Santone, Antonella
Model Checking to support Action Controls in the Purchasing Process
2016-01-01 Raucci, D; Nardone, V; Santone, Antonella
Probabilistic Model Checking applied to Spacecraft Reconfiguration
2016-01-01 Nardone, V; Santone, Antonella; Tipaldi, M; Glielmo, L.
Hey Malware, I can Find You!
2016-01-01 Mercaldo, F; Nardone, V; Santone, Antonella; Visaggio, Ca
Identification of Android Malware Families with Model Checking
2016-01-01 Battista, P; Mercaldo, F; Nardone, V; Santone, Antonella; Visaggio, Ca
Formal methods meet mobile code obfuscation identification of code reordering technique
2017-01-01 Cimitile, A; Martinelli, F; Mercaldo, F; Nardone, V; Santone, A
Identifying Mobile Repackaged Applications through Formal Methods
2017-01-01 Martinelli, F; Mercaldo, F; Nardone, V; Santone, Antonella; Visaggio, C. A.
"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine Learning versus Model Checking: A Comparison between Two Static Techniques for Malware Family Identification
2017-01-01 Corrado Aaron Visaggio, Vittoria Nardone; Nardone, Vittoria; Visaggio, CORRADO AARON
Model Checking for Mobile Android Malware Evolution
2017-01-01 Cimitile, A.; Martinelli, F; Mercaldo, F; Nardone, V; Santone, Antonella; Vaglini, G.
Diabetes Mellitus Affected Patients "Classification and Diagnosis through Machine Learning Techniques"
2017-01-01 Mercaldo, Francesco; Nardone, Vittoria; Santone, Antonella
Car Hacking Identification through Fuzzy Logic Algorithms
2017-01-01 Martinelli, F; Mercaldo, F; Nardone, V; Santone, Antonella
How Discover a Malware using Model Checking
2017-01-01 Martinelli, F; Mercaldo, F; Nardone, V; Santone, Antonella
Twinkle Twinkle Little DroidDream, How I Wonder What You Are?
2017-01-01 Martinelli, F; Mercaldo, F; Nardone, V; Santone, Antonella
Formal Methods Meet Mobile Code Obfuscation
2017-01-01 Cimitile, A.; Martinelli, F.; Mercaldo, F.; Nardone, V.; Santone, A.
Malware and Formal Methods: Rigorous approaches for detecting malicious behaviour
2017-01-01 Martinelli, Fabio; Mercaldo, Francesco; Nardone, Vittoria; Santone, Antonella
Safety Critical Systems Formal Verification Using Execution Traces
2018-01-01 Martinelli, Fabio; Mercaldo, Francesco; Nardone, Vittoria; Orlando, Albina; Santone, Antonella; Vaglini, Gigliola
Identifying Insecure Features in Android Applications using Model Checking
2018-01-01 Martinelli, F.; Mercaldo, F.; Nardone, V.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Infer Gene Regulatory Networks from Time Series Data with Probabilistic Model Checking | 1-gen-2015 | Ceccarelli, M; Cerulo, L; De Ruvo, G; Nardone, V; Santone, Antonella | |
Ransomware Steals your Phone. Formal Methods Rescue it | 1-gen-2016 | Mercaldo, F; Nardone, V; Santone, Antonella; Visaggio, C. A. | |
Download Malware? No, thanks. How Formal Methods can Block Update Attacks | 1-gen-2016 | Mercaldo, F; Nardone, V; Santone, Antonella; Visaggio, Ca | |
Ransomware Inside Out | 1-gen-2016 | Mercaldo, F; Nardone, V; Santone, Antonella | |
Model Checking to support Action Controls in the Purchasing Process | 1-gen-2016 | Raucci, D; Nardone, V; Santone, Antonella | |
Probabilistic Model Checking applied to Spacecraft Reconfiguration | 1-gen-2016 | Nardone, V; Santone, Antonella; Tipaldi, M; Glielmo, L. | |
Hey Malware, I can Find You! | 1-gen-2016 | Mercaldo, F; Nardone, V; Santone, Antonella; Visaggio, Ca | |
Identification of Android Malware Families with Model Checking | 1-gen-2016 | Battista, P; Mercaldo, F; Nardone, V; Santone, Antonella; Visaggio, Ca | |
Formal methods meet mobile code obfuscation identification of code reordering technique | 1-gen-2017 | Cimitile, A; Martinelli, F; Mercaldo, F; Nardone, V; Santone, A | |
Identifying Mobile Repackaged Applications through Formal Methods | 1-gen-2017 | Martinelli, F; Mercaldo, F; Nardone, V; Santone, Antonella; Visaggio, C. A. | |
"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine Learning versus Model Checking: A Comparison between Two Static Techniques for Malware Family Identification | 1-gen-2017 | Corrado Aaron Visaggio, Vittoria Nardone; Nardone, Vittoria; Visaggio, CORRADO AARON | |
Model Checking for Mobile Android Malware Evolution | 1-gen-2017 | Cimitile, A.; Martinelli, F; Mercaldo, F; Nardone, V; Santone, Antonella; Vaglini, G. | |
Diabetes Mellitus Affected Patients "Classification and Diagnosis through Machine Learning Techniques" | 1-gen-2017 | Mercaldo, Francesco; Nardone, Vittoria; Santone, Antonella | |
Car Hacking Identification through Fuzzy Logic Algorithms | 1-gen-2017 | Martinelli, F; Mercaldo, F; Nardone, V; Santone, Antonella | |
How Discover a Malware using Model Checking | 1-gen-2017 | Martinelli, F; Mercaldo, F; Nardone, V; Santone, Antonella | |
Twinkle Twinkle Little DroidDream, How I Wonder What You Are? | 1-gen-2017 | Martinelli, F; Mercaldo, F; Nardone, V; Santone, Antonella | |
Formal Methods Meet Mobile Code Obfuscation | 1-gen-2017 | Cimitile, A.; Martinelli, F.; Mercaldo, F.; Nardone, V.; Santone, A. | |
Malware and Formal Methods: Rigorous approaches for detecting malicious behaviour | 1-gen-2017 | Martinelli, Fabio; Mercaldo, Francesco; Nardone, Vittoria; Santone, Antonella | |
Safety Critical Systems Formal Verification Using Execution Traces | 1-gen-2018 | Martinelli, Fabio; Mercaldo, Francesco; Nardone, Vittoria; Orlando, Albina; Santone, Antonella; Vaglini, Gigliola | |
Identifying Insecure Features in Android Applications using Model Checking | 1-gen-2018 | Martinelli, F.; Mercaldo, F.; Nardone, V. |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile